General

  • Target

    2532-9-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    329dec0b76be8cf0b803a83d197d96af

  • SHA1

    2c49ca0a338b13c7efc5389cd14d4af75207589e

  • SHA256

    c2c0ecbba0acad93b06313f6e68d23d678944413e3bd6582d708107f1043b160

  • SHA512

    d0a88c0f79bd665baa39dd1e38d37de080039b054df249478179f97681722d7bbe2230043f95437f56edbd1cf6d59f786066df2028cc42544174e57b59f505a2

  • SSDEEP

    3072:gElKthWFjI0SdbnhOibbzHDvVC3jE0i1rUfoTzmoJg8e8hO:hK4jI0SdbndrUjE0bfoTzmoG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

smokiez

C2

194.169.175.232:45450

Attributes
  • auth_value

    7b7d8a036038ab89b98f422d559b4f8f

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2532-9-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections